https:\/\/www.oracle.com\/java\/technologies\/javase\/8u331-relnotes.html<\/a>; JDK-8278972). This made it impossible on two of our SOA environments to sign in into the Fusion Middleware Enterprise Manager on SOA Suite 12.2.1.4 environments. Somehow the ADF components tried to establish an ldap connection to ldap:\/\/[soacloudtest.intern.dns]:7001 which was not considered a valid IPV6 address:<\/p>\n<Apr 22, 2022 5:51:57,555 PM CEST> <Warning> <oracle.ods.virtualization.engine.backend.jndi.DefaultAuthenticator.BackendJNDI> <LIBOVD-40403> <Connect timeout not set, defaulting to 15000ms.>\u00a0<\/i><\/p>\n
<Apr 22, 2022 5:51:57,804 PM CEST> <Warning> <oracle.ods.virtualization.engine.backend.jndi.DefaultAuthenticator.BackendJNDI> <LIBOVD-40118> <Could not automatically detect binary attribute list: Malformed IPv6 address at index 8: ldap:\/\/[soacloudtest.intern.dns]:8001.>\u00a0<\/i><\/p>\n
<Apr 22, 2022 5:51:57,835 PM CEST> <Error> <oracle.help.web.rich.OHWFilter> <BEA-000000> <ADFSHARE-00120: Error encountered while creating the MDS Session. Application state will be reset. Please logout and log back in if problem persists.<\/i><\/p>\n
oracle.adf.share.ADFShareException: ADFSHARE-00120: Error encountered while creating the MDS Session. Application state will be reset. Please logout and log back in if problem persists.<\/i><\/p>\n
Wherever that square brackets were coming from in the URI I\u2019ve so far not been able to analyze. At least changing the setDomainEnv.sh of the environment to include<\/p>\n
JAVA_PROPERTIES=\"-Dcom.sun.jndi.ldapURLParsing=legacy\u00a0 \u2026.\u201d<\/pre>\ndid solve the issue and made it possible to finish the upgrade. Oracle is still investigating this, since it happened only on some of our customer environments (and e.g. only on SOA Suite, never on OAM\/OID) I\u2019m so far not sure what is wrong \u201cunder the hoods\u201d that lead to that wrong URL being called.<\/p>\n
Update: In the meantime Oracle released an official patch for this issue: EM Console Login Not Working After Installing JDK 1.8 331 (Doc ID 2864820.1)<\/p>\n
However the above workaround might be helpful in other areas \/custom applications as well that are not 100% properly coded so far.<\/p>\n
ORDS 22.1<\/h3>\n
In April Oracle also released the ORDS 22.1 release. Keep in mind that there are a lot of architecture changes with that release, so upgrading from 21.4 to 22.1 is a bit more complicated than the usual \u201creplacement of the .war file\u201d. I\u2019ll cover the upgrade in a future blog in the coming weeks.<\/p>\n
Summary<\/h3>\n
Even though we encountered some issues while applying the April 2022 CPUs I\u2019d highly recommend to go through the effort of applying the patches: They fix a lot of critical issues and vulnerabilities that you definitely don\u2019t want to leave unpatched \u2013 especially when providing public services such as iSupplier Portal on those environments. Obviously you\u2019ll want to apply those patches on a dev\/test environment first before bringing them to production!<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<\/div>\n<\/article>\n
[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"
Recently Oracle released the Critical Patch Update for April 2022.<\/p>\n
We analyzed the security patches published and first of all: There is a lot of highly critical stuff in this quarter\u2019s release, especially for E-Business Suite (incl. Cloud Manager -maximum CVSS base score of 9.8), Fusion Middleware (a whole bunch of 9.8 ratings with more Log4J as well).<\/p>\n","protected":false},"author":2,"featured_media":1244,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[440],"tags":[],"dipi_cpt_category":[],"class_list":["post-1334","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-techblog-en"],"_links":{"self":[{"href":"https:\/\/promatis-test.de\/ch\/en\/wp-json\/wp\/v2\/posts\/1334"}],"collection":[{"href":"https:\/\/promatis-test.de\/ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/promatis-test.de\/ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/promatis-test.de\/ch\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/promatis-test.de\/ch\/en\/wp-json\/wp\/v2\/comments?post=1334"}],"version-history":[{"count":0,"href":"https:\/\/promatis-test.de\/ch\/en\/wp-json\/wp\/v2\/posts\/1334\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/promatis-test.de\/ch\/en\/wp-json\/wp\/v2\/media\/1244"}],"wp:attachment":[{"href":"https:\/\/promatis-test.de\/ch\/en\/wp-json\/wp\/v2\/media?parent=1334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/promatis-test.de\/ch\/en\/wp-json\/wp\/v2\/categories?post=1334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/promatis-test.de\/ch\/en\/wp-json\/wp\/v2\/tags?post=1334"},{"taxonomy":"dipi_cpt_category","embeddable":true,"href":"https:\/\/promatis-test.de\/ch\/en\/wp-json\/wp\/v2\/dipi_cpt_category?post=1334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}